Product Avatar Image

PKWARE

Show rating breakdown
8 reviews
  • 8 profiles
  • 11 categories
Average star rating
4.5
Serving customers since
1986

Featured Products

Product Avatar Image
PK Encrypt

1 review

PK Encrypt® is an enterprise-grade encryption solution designed to provide persistent data protection across IBM Systems. It ensures that sensitive information remains secure, whether at rest, in use, or in motion, by applying robust encryption that stays with the data throughout its lifecycle. This approach addresses the challenges of safeguarding data as it moves beyond the secure confines of IBM Z environments into distributed systems and cloud platforms. Key Features and Functionality: - Persistent Encryption: Utilizes AES-256 encryption standards to maintain continuous protection of sensitive data, regardless of its location or state. - Cross-Platform Compatibility: Ensures seamless data security across various platforms, facilitating encrypted data exchanges between IBM Z and non-z/OS environments. - Seamless Integration: Integrates with IBM's security frameworks, including SAF, CPACF, ICSF, and IBM Pervasive Encryption®, providing a cohesive security experience. - Flexible Encryption Options: Offers encryption using OpenPGP or X.509 certificates, catering to diverse transfer and storage requirements. Primary Value and Problem Solved: PK Encrypt addresses the critical need for robust data security in organizations relying on IBM Systems. By implementing persistent encryption, it mitigates the risks associated with data breaches, unauthorized access, and compliance violations. This solution ensures that sensitive information remains protected throughout its journey across various networks and platforms, thereby enhancing organizational integrity and trustworthiness.

Product Avatar Image
PK Privacy

2 reviews

PK Privacy is a comprehensive data privacy solution designed to help organizations automate the discovery, protection, and management of personally identifiable information (PII across their enterprise. By integrating advanced data discovery and remediation capabilities, PK Privacy enables businesses to comply seamlessly with various data privacy regulations, such as GDPR, CCPA, HIPAA, and more. This solution ensures that sensitive data is identified and safeguarded, reducing organizational risks and operational complexities associated with privacy legislation. Key Features and Functionality: - Automated Data Discovery: Identifies sensitive data stored across file servers, databases, endpoints, and big data repositories, providing a comprehensive view of where PII resides within the organization. - Data Subject Access Request (DSAR Management: Automates the response process to DSARs, enabling organizations to meet regulatory requirements efficiently and cost-effectively. - Right to Be Forgotten Compliance: Allows the creation of rules to automatically erase, mask, or encrypt sensitive data upon discovery, ensuring adherence to data erasure requests. - Privacy-Enhancing Techniques: Supports pseudonymization, anonymization, and de-identification of personal data to protect individual privacy while maintaining data utility. - Retention Policy Enforcement: Scans datasets to identify data that should be archived or deleted based on age or lack of use, aiding in compliance with data retention policies. - Breach Detection and Response: Monitors endpoints, servers, and enterprise solutions to detect and confirm data breaches promptly, facilitating accurate impact assessment and reporting. Primary Value and Problem Solved: PK Privacy addresses the critical need for organizations to manage and protect sensitive personal data amidst an evolving regulatory landscape. By automating the discovery and remediation of PII, it reduces the operational burden associated with compliance, minimizes the risk of data breaches, and ensures that privacy obligations are met efficiently. This proactive approach not only safeguards individual privacy but also enhances organizational trust and reputation.

Product Avatar Image
PKWARE SecureZIP

3 reviews

SecureZIP™ by PKWARE is an enterprise-grade solution that seamlessly integrates robust encryption with advanced data compression, ensuring sensitive information remains protected across various platforms and environments. By encrypting data at the file level, SecureZIP guarantees that information stays secure, whether at rest, in transit, or in use, effectively mitigating risks associated with data breaches and unauthorized access. Key Features and Functionality: - Persistent File-Level Encryption: Applies strong encryption directly to files, ensuring data remains protected regardless of its location or state. - Flexible Encryption Methods: Supports both password-based and certificate-based encryption, including X.509 and OpenPGP standards, catering to diverse security requirements. - Advanced Data Compression: Utilizes PKWARE’s industry-leading compression technology to reduce file sizes by up to 95%, optimizing storage and transmission efficiency. - Cross-Platform Compatibility: Ensures encrypted files can be accessed and decrypted by authorized users across various operating systems, enhancing interoperability. - Consistent Policy Enforcement: Enables organization-wide control over data security policies, ensuring uniform protection measures are applied throughout the enterprise. Primary Value and Problem Solved: SecureZIP addresses the critical need for persistent, data-level security in an era where traditional network and device protections are insufficient. By combining robust encryption with efficient compression, it not only safeguards sensitive information but also reduces storage and transmission costs. This dual functionality ensures organizations can protect their data comprehensively while maintaining operational efficiency, thereby meeting compliance requirements and mitigating the risks associated with data breaches.

Profile Filters

All Products & Services

Product Avatar Image
PKWARE SecureZIP

3 reviews

SecureZIP™ by PKWARE is an enterprise-grade solution that seamlessly integrates robust encryption with advanced data compression, ensuring sensitive information remains protected across various platforms and environments. By encrypting data at the file level, SecureZIP guarantees that information stays secure, whether at rest, in transit, or in use, effectively mitigating risks associated with data breaches and unauthorized access. Key Features and Functionality: - Persistent File-Level Encryption: Applies strong encryption directly to files, ensuring data remains protected regardless of its location or state. - Flexible Encryption Methods: Supports both password-based and certificate-based encryption, including X.509 and OpenPGP standards, catering to diverse security requirements. - Advanced Data Compression: Utilizes PKWARE’s industry-leading compression technology to reduce file sizes by up to 95%, optimizing storage and transmission efficiency. - Cross-Platform Compatibility: Ensures encrypted files can be accessed and decrypted by authorized users across various operating systems, enhancing interoperability. - Consistent Policy Enforcement: Enables organization-wide control over data security policies, ensuring uniform protection measures are applied throughout the enterprise. Primary Value and Problem Solved: SecureZIP addresses the critical need for persistent, data-level security in an era where traditional network and device protections are insufficient. By combining robust encryption with efficient compression, it not only safeguards sensitive information but also reduces storage and transmission costs. This dual functionality ensures organizations can protect their data comprehensively while maintaining operational efficiency, thereby meeting compliance requirements and mitigating the risks associated with data breaches.

Product Avatar Image
PK Protect Platform

2 reviews

The need for effective endpoint security measures has increased substantially. Any device—such as a smartphone, tablet, or laptop—can be an entry point for threats. The right endpoint security solution can help organizations detect suspicious instances of data being moved around inside and outside of an organization. PK Protect® Endpoint Manager (PEM) provides revolutionary data protection that automatically discovers and protects critical information, even when it moves outside of the organization.

Product Avatar Image
PK Privacy

2 reviews

PK Privacy is a comprehensive data privacy solution designed to help organizations automate the discovery, protection, and management of personally identifiable information (PII across their enterprise. By integrating advanced data discovery and remediation capabilities, PK Privacy enables businesses to comply seamlessly with various data privacy regulations, such as GDPR, CCPA, HIPAA, and more. This solution ensures that sensitive data is identified and safeguarded, reducing organizational risks and operational complexities associated with privacy legislation. Key Features and Functionality: - Automated Data Discovery: Identifies sensitive data stored across file servers, databases, endpoints, and big data repositories, providing a comprehensive view of where PII resides within the organization. - Data Subject Access Request (DSAR Management: Automates the response process to DSARs, enabling organizations to meet regulatory requirements efficiently and cost-effectively. - Right to Be Forgotten Compliance: Allows the creation of rules to automatically erase, mask, or encrypt sensitive data upon discovery, ensuring adherence to data erasure requests. - Privacy-Enhancing Techniques: Supports pseudonymization, anonymization, and de-identification of personal data to protect individual privacy while maintaining data utility. - Retention Policy Enforcement: Scans datasets to identify data that should be archived or deleted based on age or lack of use, aiding in compliance with data retention policies. - Breach Detection and Response: Monitors endpoints, servers, and enterprise solutions to detect and confirm data breaches promptly, facilitating accurate impact assessment and reporting. Primary Value and Problem Solved: PK Privacy addresses the critical need for organizations to manage and protect sensitive personal data amidst an evolving regulatory landscape. By automating the discovery and remediation of PII, it reduces the operational burden associated with compliance, minimizes the risk of data breaches, and ensures that privacy obligations are met efficiently. This proactive approach not only safeguards individual privacy but also enhances organizational trust and reputation.

Product Avatar Image
PK Encrypt

1 review

PK Encrypt® is an enterprise-grade encryption solution designed to provide persistent data protection across IBM Systems. It ensures that sensitive information remains secure, whether at rest, in use, or in motion, by applying robust encryption that stays with the data throughout its lifecycle. This approach addresses the challenges of safeguarding data as it moves beyond the secure confines of IBM Z environments into distributed systems and cloud platforms. Key Features and Functionality: - Persistent Encryption: Utilizes AES-256 encryption standards to maintain continuous protection of sensitive data, regardless of its location or state. - Cross-Platform Compatibility: Ensures seamless data security across various platforms, facilitating encrypted data exchanges between IBM Z and non-z/OS environments. - Seamless Integration: Integrates with IBM's security frameworks, including SAF, CPACF, ICSF, and IBM Pervasive Encryption®, providing a cohesive security experience. - Flexible Encryption Options: Offers encryption using OpenPGP or X.509 certificates, catering to diverse transfer and storage requirements. Primary Value and Problem Solved: PK Encrypt addresses the critical need for robust data security in organizations relying on IBM Systems. By implementing persistent encryption, it mitigates the risks associated with data breaches, unauthorized access, and compliance violations. This solution ensures that sensitive information remains protected throughout its journey across various networks and platforms, thereby enhancing organizational integrity and trustworthiness.

Product Avatar Image
PKWARE PKZip

0 reviews

PKZIP® by PKWARE is a robust data compression software designed to significantly reduce file sizes, enhancing storage efficiency and accelerating data transmission. With the capability to compress files by up to 95%, PKZIP addresses the escalating demands of data storage and transfer in today's digital landscape. Key Features and Functionality: - High Compression Efficiency: Achieves up to 95% reduction in file sizes, optimizing storage and bandwidth usage. - Cross-Platform Compatibility: Supports major enterprise computing platforms, facilitating seamless data exchange across diverse systems. - Versatile Archive Support: Creates and extracts multiple archive formats, including ZIP, TAR, BZ2, GZIP, and more, ensuring flexibility in data management. - Advanced Encryption: Offers strong encryption options, including AES up to 256-bit, to secure sensitive data during compression. - Large File Handling: Manages extensive compression tasks, accommodating over 2 billion files in a single archive and compressing files exceeding 9 exabytes. Primary Value and User Solutions: PKZIP addresses the challenges of escalating data volumes by providing an efficient solution for reducing file sizes, thereby lowering storage costs and improving transmission times. Its cross-platform functionality ensures seamless data exchange across various systems, enhancing operational efficiency. The integration of strong encryption safeguards sensitive information, ensuring data security during storage and transfer. By streamlining data management processes, PKZIP empowers organizations to handle large-scale data operations effectively and securely.

Product Avatar Image
PK Protect Endpoint Manager

0 reviews

Your DLP tool monitors traffic and blocks external drives. That's fine, until a file gets copied to a SharePoint folder, emailed to a personal account, or saved to a laptop nobody flagged. The perimeter approach has a ceiling. PK Protect Endpoint Manager (PEM) works below it. PEM is an endpoint data security solution that automatically discovers sensitive data across desktops, laptops, servers, file shares, and Microsoft 365, then applies protection without waiting for a user to do the right thing. Policy-driven actions are enforced centrally and executed automatically. Users can't override them. What it does: PEM continuously scans endpoints for sensitive data including PII, PCI data, PHI, and custom data types. When it finds something, it acts based on your policy: encrypt, redact, classify, mask, move, quarantine, or delete. Protection travels with the data, so even if a file moves outside the organization, the security moves with it. Who it's built for: IT security teams, compliance officers, and data privacy leaders in regulated industries who need consistent, auditable protection across every endpoint in the enterprise without depending on employee behavior to enforce it. Where it's different from DLP: Traditional DLP solutions focus on egress. PEM secures the data itself. That means protection holds even when files are moved, copied, or shared, and even when credentials are compromised. Certificate-free, policy-based encryption keeps workflows intact without the overhead of traditional key management. Compliance support: PEM supports audit readiness for PCI DSS, HIPAA, GDPR, CCPA, GLBA, FISMA, and more, with centralized reporting and visibility into exactly which files are sensitive, who accessed them, and where. Trusted by 21 of the top 25 U.S. commercial banks and deployed across hundreds of thousands of endpoints worldwide.

Product Avatar Image
PK Protect Data Store Manager

0 reviews

PK Protect Data Store Manager Most organizations have a reasonable handle on what data lives on their endpoints. The real problem is everything else: the databases, data lakes, cloud repositories, packaged applications, and ERPs holding petabytes of sensitive data that nobody has fully mapped, let alone protected. That's the problem PK Protect Data Store Manager (DSM) was built to solve. DSM automatically discovers and protects sensitive data across your entire backend data infrastructure, structured, semi-structured, and unstructured, without requiring manual intervention or relying on individual teams to know where everything is. Once data is found, policy-driven protections are applied automatically: masking, tokenization, encryption, redaction, quarantine, or deletion. What it does: DSM scans and protects petabytes of data across on-premises, hybrid, and cloud environments. It supports the broadest range of platforms in the industry including Oracle, SQL Server, PostgreSQL, DB2, Hadoop, AWS, Azure, Snowflake, Salesforce, and more. It also surfaces shadow data, the untracked, forgotten data sitting in corners of your environment that traditional tools miss entirely. Who it's built for: Data security, compliance, and privacy teams in regulated industries managing large, distributed data environments who need consistent protection across every data store, not just the ones they already know about. Where it stands out: DSM keeps data usable while keeping it secure. That means masked data remains available for development, testing, AI training, and analytics without exposing the underlying sensitive values. More than thirty masking options give teams the flexibility to match protection to use case without breaking downstream workflows. Compliance support: DSM meets requirements for PCI DSS, HIPAA, GDPR, CCPA, GLBA, SOX, FISMA, and more, with automated policy enforcement and audit-ready reporting built in. One top U.S. bank relies on DSM to protect sensitive data across 400 applications and 18,000 databases containing nearly a million tables.

Product Avatar Image
PK Protect For z/OS

0 reviews

IBM Z is the most secure computing platform on the planet. The problem is not what happens to your data on the mainframe. The problem is what happens when it leaves. When z/OS production data gets copied to development, test, cloud, or analytics environments, IBM's Pervasive Encryption no longer applies. That data is exposed. In most organizations it has been accumulating that way for decades, with no clear picture of what sensitive data exists, where it moved, or whether it is protected. PK Protect for z/OS closes that gap. As an IBM Partner Plus with four decades of mainframe expertise, PKWARE delivers the only solution purpose-built to discover and protect sensitive data on IBM Z, in motion and at rest, whether or not it stays on the mainframe. What it does: PK Protect for z/OS automatically discovers sensitive data across VSAM clusters, sequential, partitioned, and tape data sets using your own application data definitions and copybooks for maximum accuracy. The entire discovery process runs on the mainframe, with no copies left behind and sensitive data staying 100% on-premises. Persistent encryption travels with data as it moves out of z/OS, so protection holds regardless of where the data lands. SchemaLink Technology: PK Protect for z/OS includes SchemaLink, which provides discovery support for z/OS datasets with or without copybooks. It is the only solution in the industry that delivers this level of flexibility for mainframe data structures, eliminating manual mapping and dramatically reducing discovery time. Who it's built for: Mainframe security, compliance, and modernization teams at large enterprises in financial services, insurance, government, and healthcare who need accurate visibility into decades of accumulated z/OS data and persistent protection that follows data beyond the mainframe. Compliance and modernization: Supports PCI DSS, HIPAA, GDPR, GLBA, and FISMA with automated reporting and SBOM generation to accelerate audits. Protects sensitive data throughout modernization initiatives as workloads migrate to cloud and hybrid environments. In one risk assessment, PK Protect scanned 504 million VSAM records and found that 88% contained vulnerable sensitive data.

Profile Name

Star Rating

5
3
0
0
0

PKWARE Reviews

Review Filters
Profile Name
Star Rating
5
3
0
0
0
SK
Selin K.
07/31/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Strategic data privacy initiative

PK Privacy is good at employing automation. It helps in finding out the data and preparing the responses on its own which makes my team’s work very easy. It was useful also that some first impressions in DSAR responses are already prepared as templates for all organizations.
YB
Yelissa B.
07/22/2024
Validated Reviewer
Review source: G2 invite
Incentivized Review

Protects your company and your company from improper access

It is a powerful tool in cyber protection areas, this solution solves problems of unauthorized access or leakage of business information thanks to its complete encryption system, PK Encrypt understands that it is necessary to protect business data as well as access to systems, it also has With integration capabilities with the main IBM tools quickly and reliably, this solution creates very powerful security keys so it is unlikely that you will have access to the information without having this information, and it is also adaptable to companies without being so essential the industry where it takes off
Jackie K.
JK
Jackie K.
Sales Supervisor at DSW Designer Shoe Warehouse
03/14/2023
Validated Reviewer
Review source: G2 invite
Incentivized Review

Very Good!

I like the concept of it being private only to our company

About

Contact

HQ Location:
Milwaukee, WI

Social

@PKWARE

What is PKWARE?

PKWARE is a data security and compression software company that specializes in providing solutions for data protection. With a focus on encryption and secure data transmission, PKWARE offers products designed to help organizations safeguard sensitive information across various platforms, including mainframes, servers, and cloud environments. Their solutions enable businesses to automate data protection processes, ensuring compliance with industry regulations and minimizing security risks. PKWARE is known for its Smartcrypt and other enterprise data protection tools.

Details

Year Founded
1986